We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 61-80 of 10,000 results
  1. Why the use of domain-specific modeling in airworthy software requires new methods and how these might look like? (extended version)

    The use of domain-specific modeling (DSM) in safety-critical avionics is rare, even though the ever-increasing complexity of avionics systems makes...

    Vanessa Tietz, Constantin Frey, ... Bjoern Annighoefer in Innovations in Systems and Software Engineering
    Article Open access 10 July 2024
  2. Machine learning-based opinion extraction approach from movie reviews for sentiment analysis

    The field of sentiment mining, also known as sentiment analysis and sentiment extraction, has shown a surge with diverse applications. Various...

    Mustafa Abdalrassual Jassim, Dhafar Hamed Abd, Mohamed Nazih Omri in Multimedia Tools and Applications
    Article 10 July 2024
  3. Signal processing implementation of low-cost target speed detection of CW radar using FPGA

    The low-cost Continuous Wave (CW) radar architecture for object speed detection is presented in this research. An FPGA (Field-Programmable Gate...

    Sameh G. Salem, Mohamed El Hosseny in International Journal of Information Technology
    Article Open access 10 July 2024
  4. Survey-based analysis of cybersecurity awareness of Turkish seafarers

    In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...

    Ivar Moen, Aybars Oruc, ... Georgios Kavallieratos in International Journal of Information Security
    Article Open access 10 July 2024
  5. RALFusion: a residual attention guided lightweight deep-learning framework for infrared and visible image fusion

    Infrared and visible image fusion plays an important role in subsequent advanced visual tasks, especially for complex marine environments. To improve...

    Ting Liu, Yuxin Zhang, ... Yunsheng Fan in Multimedia Tools and Applications
    Article 10 July 2024
  6. Towards enhancing shadow removal from images

    Addressing challenges posed by shadows in computer vision tasks, this study employs advanced deep learning techniques for shadow removal in RGB...

    Muhammad Hamza Tariq, Ahmad Salman, Khawar Khurshid in Multimedia Tools and Applications
    Article 10 July 2024
  7. BangleFIR: bridging the gap in fashion image retrieval with a novel dataset of bangles

    In this paper, we introduce Bangle Fashion Image Retrieval (BangleFIR), a novel dataset focusing on bangles within the fashion domain. While garment...

    Sk Maidul Islam, Subhankar Joardar, Arif Ahmed Sekh in Multimedia Tools and Applications
    Article 10 July 2024
  8. A review of video-based human activity recognition: theory, methods and applications

    Video-based human activity recognition (HAR) is an important task in many fields, such as healthcare monitoring, video surveillance, and sports...

    Tanvir Fatima Naik Bukht, Hameedur Rahman, ... Ahmad Jalal in Multimedia Tools and Applications
    Article 10 July 2024
  9. Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph

    Up to now, the smart contract vulnerabilities detection methods based on sequence modal data and sequence models have been the most commonly used....

    Peng Su, **gyuan Hu in Multimedia Systems
    Article 10 July 2024
  10. Fast Learning Network Algorithm for Voice Pathology Detection and Classification

    The utilisation of ML (Machine Learning) techniques in the detection of the VP (Voice Pathology) has recently gained a lot of consideration. However,...

    Musatafa Abbas Abbood Albadr, Masri Ayob, ... Ali Hashim Abbas in Multimedia Tools and Applications
    Article 10 July 2024
  11. Enhancement of patient's health prediction system in a graphical representation using digital twin technology

    The patient health prediction system is the most critical study in medical research. Several prediction models exist to predict the patient's health...

    M. Sobhana, Smitha Chowdary Ch, ... K. Kranthi Kumar in Multimedia Tools and Applications
    Article 10 July 2024
  12. A robust method for malware analysis using stacking classifiers and dendrogram visualization

    Malware analysis is a vital and challenging task in the ever-changing cyber threat landscape. Traditional signature-based methods cannot keep up with...

    N. Naveen Kumar, S. Balamurugan, ... P. Seshu Kumar in International Journal of Information Technology
    Article 09 July 2024
  13. An optimized deep network-based intermediate code generation for the mathematical expression

    In recent times, the system's mathematical expression and operation have gained greater reach in engineering and mathematics. It is vital to solving...

    H. N. Sharada, Basavaraj Anami, Shridhar Allagi in Multimedia Tools and Applications
    Article 09 July 2024
  14. Introducing a parametric function on relaxation times in magnetic resonance imaging

    Relaxation times in MRI are able to indicate various objects on the T 1 - and T 2 -weighted images as well as the other pathophysiological quantities....

    Mansour Ashoor, Abdollah Khorshidi in Multimedia Tools and Applications
    Article 09 July 2024
  15. Lorentz-modulated multiscale nonlinear diffusion for stitching in near-uniform scenes

    Image stitching finds diverse applications in multimedia contexts, and creating panoramic images with this technique can be particularly challenging...

    Tze Kian Jong, David B. L. Bong in Multimedia Tools and Applications
    Article 09 July 2024
  16. A comprehensive review on the Internet of Things in precision agriculture

    A quickening transformation in the agriculture sector is being driven by the growth of Internet of Things (IoT) technology. The need for food...

    Gurpreet Singh, Sandeep Sharma in Multimedia Tools and Applications
    Article 09 July 2024
  17. Recognizing text lines in handwritten archival document images using octave convolutional and attention recurrent neural networks

    Over the past several years, many archivists and historians have pointed out growing needs closely related to robust and efficient offline...

    Olfa Mechi, Maroua Mehri, ... Najoua Essoukri Ben Amara in Multimedia Tools and Applications
    Article 09 July 2024
  18. iDOCEM

    In the business process lifecycle, models can be approached from two perspectives: on the one hand, models are used to create systems in the design...

    Charlotte Verbruggen, Alexandre Goossens, ... Monique Snoeck in Software and Systems Modeling
    Article 09 July 2024
  19. A principal label space transformation and ridge regression-based hybrid gorilla troops optimization and jellyfish search algorithm for multi-label classification

    Classification as an essential part of Machine Learning and Data Mining has significant roles in engineering, medicine, agriculture, military, etc....

    Seyed Hossein Seyed Ebrahimi, Kambiz Majidzadeh, Farhad Soleimanian Gharehchopogh in Cluster Computing
    Article 09 July 2024
  20. Electromagnetic properties of coal using microstrip and an algorithm based on the Nicolson-Ross-Weir method

    The work implements an experimental methodology to find the dielectric parameters: electrical permittivity, effective permittivity, magnetic...

    David Leonardo Mancipe-Huérfano, Rafael Guillermo García-Cáceres in International Journal of Information Technology
    Article Open access 09 July 2024
Did you find what you were looking for? Share feedback.